International audienceThe unsupervised detection of network attacks represents an extremely challenging goal. Current methods rely on either very specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic data-sets for profiling and training. In this paper we present a completely unsupervised approach to detect attacks, without relying on signatures, labeled traffic, or training. The method uses robust clustering techniques to detect anomalous traffic flows. The structure of the anomaly identified by the clustering algorithms is used to automatically construct specific filtering rules that characterize its nature, providing easy-to-interpret information to the network operator. In addition, t...
Recently data mining methods have gained importance in addressing network security issues, including...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
International audienceNetwork anomalies and attacks represent a serious challenge to ISPs, who need ...
7 pagesNetwork traffic anomaly detection and analysis has been a hot research topic for many years. ...
International audienceTraditional Network Intrusion Detection Systems (NIDSs) rely on either special...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
none4Network intrusion detection is a key security issue that can be tackled by means of different a...
6 pagesInternational audienceTraditional Network Intrusion Detection Systems (NIDSs) rely on either ...
The goal of Network Intrusion Detection Systems (NIDSs) is to protect against attacks by inspecting ...
Anomaly detection has become a vital component of any network in today's Internet. Ranging from non-...
(NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and diffic...
Most current network intrusion detection systems employ signature-based methods or data mining-based...
Recently data mining methods have gained importance in addressing network security issues, including...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
International audienceNetwork anomalies and attacks represent a serious challenge to ISPs, who need ...
7 pagesNetwork traffic anomaly detection and analysis has been a hot research topic for many years. ...
International audienceTraditional Network Intrusion Detection Systems (NIDSs) rely on either special...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
none4Network intrusion detection is a key security issue that can be tackled by means of different a...
6 pagesInternational audienceTraditional Network Intrusion Detection Systems (NIDSs) rely on either ...
The goal of Network Intrusion Detection Systems (NIDSs) is to protect against attacks by inspecting ...
Anomaly detection has become a vital component of any network in today's Internet. Ranging from non-...
(NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and diffic...
Most current network intrusion detection systems employ signature-based methods or data mining-based...
Recently data mining methods have gained importance in addressing network security issues, including...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and...